Snyk has a proof-of-concept or detailed explanation of how to exploit this vulnerability.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsUpgrade github.com/kyverno/kyverno/pkg/cosign
to version 1.14.0-alpha.1 or higher.
Affected versions of this package are vulnerable to Improper Verification of Cryptographic Signature in the matchSignatures()
function in cosign.go
, which does not check for subjectRegExp
or issuerRegExp
values during artifact signature verification. An attacker can deploy unauthorized Kubernetes resources. This is only exploitable if the attacker has access to a private key of any certificate in the certificate chain trusted by cosign, access to a container registry to push artifact images, and permissions to deploy artifacts.